Make Money

Visitors

Kim Ji won 김지원 - Bombastic cute dance

Tuesday, December 22, 2015

There are two types of hackers. First one are good hackers who are
known as “white hat” hackers and another one which we will be talking
about today are called “black hat” hackers.
In this post, I will talk about six famous black hat hackers and their hacks which made them famous or wanted.

1. George Hotz

Young and talented and what is the most important bored teenager, George Hotz
wanted to have fun one summer night and as a result he hacked the
Sony’s company Iphone. It happened in June of 2007, by that time George
was 17. It was a bit of a challenge, because how to hack device with
assistant things? The secret is to figure out how “to speak to the
device”. He also mentioned that what he did was completely legal. It
seems people can be dangerous in certain way when they are bored. Who
knows what may happen if crazy smart geek will find thy way of his
ideas.

2. Kevin Mitnick

Kevin Mitnick is well-known as the most-wanted computer criminal in the United States. He was in high school when he
started hacking. For several years he hacked dozens ofcompanies. What
interesting, for those “services” he was finally arrested in 1995 at his
apartment for hacking. Kevin also has served 5 years in prison,
nevertheless despite of his experience he runs his own security firm
named Mitnick Security Consulting. The other side of the coin is,
however Mitnick published a book that calls “Ghost in Wires”, which is
about his upps-and-downs, victories and crushes. He shared that every
hack was like a climbing to mountain and he reached the Everest. This is
one more proof how talent have pined, because of a boredom.

3. Adrian Lamo

Adrian was called as the most effective and controversial hacker of the 21st century. That is very flattering status. He was
famous for breaking into several high-profile computer networks. Lamo
might use his gift to help people to consult, what is actually he did,
but as exception and compromise. His baby steps in hacking, Adrian Lamo
made pretty early and became known for the first time for operating AOL
watchdog site. As many others, he was arrested in 2003 and had to
correspond for each and every computer crime.Thus, even if Lamo now
works as a threat analyst and public speaker, his glory will always
follow him, because our past if the part of our “present” and a part of
who we are.

4. Gary McKinnon

This
“black hat” McKinnon hacked into 97 United States military and NASA
computers. He could be the biggest threat for government. Glasgow-born
McKinnon
wanted the truth to come out and show itself. In March 2002 Gary was
arrested by police. “Black hat” used his hacking skills to “research”
his beliefs and evidence of UFOs inexhaustible source of power, into the
US government’s computers. He didn’t do that because of boredom, but
because of obsession and thirst to hidden knowledge. Probably this
computer crime is serious, but forgivable. Man wasn’t going to hack
computer system because he was bored or to prove something, we was
looking for truth no more than.

5. Jonathan James

Story of Jonathan James is sad, nevertheless his life can be compared to come t
– short, but bright. In 1999 teenager at the age of 15 years old hacked
into Bellsouth and Miami-Dade school network. Jonathan James damaged
NASA Systems, it costed $41,000 to fix the systems. It goes without
saying that he made serious damage. To stole software from NASA that
worth $1.7 Million is one the biggest computer crimes. He wasn’t after
information or justice, he was after money… As they say, never speak ill
of the dead. Jonathan James was sentenced 6 months house arrest and
banned from using computer, however that didn’t prevent him to commit
suicide.

6. Kevin Poulsen

This talented “cyber-terrorists” could have great career and almost blow
his chance. It seems that this hacker likes contracts and his life
reflects it pretty well. He hacked into the US Department of Defense’s
Arpanet. However later he worked as a consultant testing Pentagon
computer security. Late on Kevin hacked FBI, after that hacked phone
lines to radio station of Los Angeles… Poulsen’s life reminded American
switchbacks…Certainly he was wanted by FRI and finally they caught him.
Despite of such interesting past, Kevin is law-abiding citizen and has
several awards of International Academy of Digital Arts and Sciences.

As promised, Anonymous posted a link to a Pastebin
account with the names, aliases, Google Plus profiles, Facebook
accounts and other identifying information of roughly 1,000 individuals
the group believes are members of the Ku Klux Klan.

The hackers behind the leak tweeted a link to a Pastebin on a Twitter account, Operation KKK (@Operation_KKK) believed to be controlled by them.

Ku Klux Klan (KKK) is classified as a White Supremacist Racist
group by the Anti-Defamation League and the Southern Poverty Law Center,
allegedly having total 5,000 to 8,000 members.

"We hope Operation KKK will, in part, spark a bit of constructive
dialogue about race, racism, racial terror and freedom of expression,
across group lines. Public discourse about these topics can be honest,
messy, snarky, offensive, humbling, infuriating, productive, and serious
all at once," Anonymous wrote in the Pastebin post."The reality is that racism usually does NOT wear a hood, but it does
permeate our culture on every level. Part of the reason we have taken
the hoods off of these individuals is not because of their identities,
but because of what their hoods symbolize to us in our broader society."

Anonymous also notes that the group collected the information of KKK
members over 11 months through public documents, "digital espionage,"
interviews with experts and information from social media accounts of
KKK affiliates.

However, the group has not published any personal information about the KKK members.

Wednesday, November 4, 2015

The Online Hacktivist group Anonymous announced it plans to reveal the identities of about 1,000 Ku Klux Klan (KKK) members on 5th November, the day of the Global Protest movement known as the Million Mask March.

Million Mask March, where protesters don Guy Fawkes masks in
hundreds of cities around the world, and march together against the
corrupt Governments and corporations.

Ku Klux Klan (KKK)
is classified as a White Supremacist Racist group by the
Anti-Defamation League and the Southern Poverty Law Center, allegedly
having total 5,000 to 8,000 members.

It was founded after the Civil War by former Confederate soldiers to
fight against the reforms imposed by the North during Reconstruction.

“We've gained access to yet another KKK Twitter account. Using the
info obtained, we will be revealing about 1000 Klan member identities.”, Anonymous Hackers tweeted last week.

The list of 1000 KKK Members, to be released on 5th November, apparently
includes the names of US Politicians, according to the hackers
affiliated with Anonymous — Operation KKK.

"You operate much more like terrorists, and you should be recognized
as such. You are terrorists that hide your identities beneath sheets and
infiltrate society on every level,” the hacker collective said.

"The privacy of the Ku Klux Klan no longer exists in cyberspace. You've had blood on your hands for nearly 200 years."

Yesterday another group of Anonymous hackers, not members of Operation
KKK, published the first batch of information (unverified) on Pastebin,
which includes total 57 phone numbers and 23 email addresses allegedly
belonging to KKK members, along with names of 4 U.S. Senators and 5 City
Mayors.

However, Hackers affiliated with Operation KKK denies any connection
with the above leak and promises to release its own 1000 KKK Members
list on the 5th Nov.

Tuesday, November 3, 2015

DroidJack is an Android RAT (Remote Administration Trojon)
tool used by hackers to steal or record data on injected Android
smartphones.
DroidJack can be used to remotely access Android device from a
computer and remains hidden from the device owner. It is available on
internet for $210/£137 and it is also one of the hottest Android RAT
tool on the market, mainly used in Middle East region which affects
Android users only.
DroidJack has cool features such as:

GPS tracking

Send, delete, view SMS

View contacts, call logs and make a phone call

View history browsers and bookmarks

Open an app

Turn ON/OFF camera and microphone

According to the spokesman said to BBC that,” A 28-year-old male from
Carlisle under suspicion of computer misuse act offences,” this arrest
was made in connection with the international DroidJack operation and he
has been bailed next 6 months.
Police have raided 13 houses in Germany and one man was arrested in
the UK (United Kingdom). Germany suspects that 19 – 51 aged people are
involved in DroidJack.
Conclusion: Buying DroidJack Android RAT and installing in on victims device without their permission will put you in danger of being arrested by police.

Sunday, October 18, 2015

Malaysian authorities have arrested a Kosovo citizen in Kuala Lumpur on Computer hacking charges and allegedly providing personal data about United States military members to the Islamic State Terrorists group (also known as ISIS or ISIL).

According to the US Department of Justice (DOJ) and the FBI, Kosovo citizen Ardit Ferizi allegedly
hacked into the US web hosting company's servers and stole personal
data of more than 1,300 US government and military employees.

Ferizi didn't use the stolen data for identity theft; instead he allegedly handed the hacked information over to Junaid Hussain (also known as Abu Hussain Al Britani), an ISIS member and hacker who was killed in a US drone strike in August.

The stolen data includes names, email addresses, passwords, phone
numbers and locations of US military service members and government
workers.

Hacker May Face up to 35 Years in Prison

Moreover, Ferizi also accessed customers' information from an unknown US Internet retailer, thereby obtaining credit card data on around 100,000 customers, according to a federal indictment unsealed in Virginia.

Ferizi, who was detained in Malaysia by local authorities, now faces
extradition to the United States to face charges. If convicted, Ferizi
could face more than 35 years in prison.

"This case is a first of its kind and with these charges, we seek to
hold Ferizi accountable for his theft of this information and his role
in (ISIS) targeting of U.S. government employees," John P.Carlin, Assistant Attorney General for National Security said in a statement.

The Most Careless Hacker Ever

Ferizi can probably be described as the most careless hacker ever for most of the reasons:

He used his real name on the Twitter account.

Instead of using Direct Messages, He used to communicate with ISIS members openly tweeting at them.

He never tried to hide his real IP address.

Ferizi, an alleged leader of the Kosova Hacker's Security (KHS) hacking group, allegedly used Twitter (@Th3Dir3ctorY) to communicate with Hussain and another ISIS member, named Tariq Hamayun (Abu Muslim Al-Britani).

Moreover, when Ferizi allegedly hacked into the unnamed US company's
servers, he logged in using the account name as KHS, which the FBI
guessed was the abbreviation of Ferizi's hacking collective, 'Kosova Hackers Security.'

Ferizi was living in Malaysia on a student visa and was studying at the
Limkokwing University of Creative Technology in Cyberjaya, Malaysia. And
if convicted, he could face up to 35 years in jail.

DISCLAIMER :"All mp3 file, videos and images are sourced from the internet and are in the public domain. I'm claim no credit for any mp3 file, videos and images featured on this site unless otherwise noted. All songs is copyright to it's respectful owners. If you own rights to any of the songs, and do not wish them to be on this site, please contact me via e-mail and they will be promptly removed. I'm not responsible for content on any external website, and a link to such site does not signify endorsement. Information on this site may contain errors or inaccuracies, the site's proprietors do not make warranty as to the correctness or reliability of the site's content."** Please..BUY THE ORIGINAL CD/CASSETTE to support our Music Industry and our Artist **